Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis

被引:4
|
作者
Zhang, Ming [1 ]
Zheng, Zizhan [2 ]
Shroff, Ness B. [1 ,3 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43202 USA
[2] Tulane Univ, Dept Comp Sci, New Orleans, LA 70118 USA
[3] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43202 USA
来源
关键词
Game theory; resource constraints; stealthy attacks;
D O I
10.1109/TCNS.2020.2993281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Stealthy attacks have become a major threat to cybersecurity. Previous works in this direction fail to capture the practical resource constraints and mainly focus on one-node settings. In this article, we propose a two-player game-theoretic model, including a system of multiple independent nodes, a stealthy attacker, and an observable defender. In our model, the attacker can fully observe the defender's behavior and the system state, whereas the defender has zero feedback information. Furthermore, a strict resource constraint is introduced to limit the frequency of the attacks/defenses for both players. We characterize the best responses for both attacker and defender under both nonadaptive and adaptive strategies. We then study the sequential game where the defender first announces its strategy and the attacker then responds accordingly. We have designed an algorithm that finds a nearly optimal strategy for the defender and provides a full analysis of its complexity and performance guarantee.
引用
收藏
页码:1665 / 1677
页数:13
相关论文
共 50 条
  • [21] A Game-Theoretic Approach to EDCA Remapping Attacks
    Szott, Szymon
    Konorski, Jerzy
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [22] Smart Meter Data Aggregation Against Wireless Attacks: A Game-Theoretic Approach
    Cao, Yang
    Duan, Dongliang
    Yang, Liuqing
    Sun, Zhi
    Zhang, Haochuan
    Yu, Rong
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 80 - 85
  • [23] Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 : 44 - 58
  • [24] Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework
    Anwar, Ahmed H.
    Atia, George
    Guirguis, Mina
    2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 78 - 83
  • [25] Defending pollution attacks in network coding enabled wireless ad hoc networks: a game-theoretic framework
    Liu, Xiang
    Huang, Jie
    Yao, Yiyang
    Qi, Chunyang
    Zong, Guowen
    IET COMMUNICATIONS, 2020, 14 (19) : 3324 - 3333
  • [26] Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective
    Sanjab, Anibal
    Saad, Walid
    IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) : 2038 - 2049
  • [27] A game-theoretic analysis of denial of service attacks in wireless random access
    Yalin Evren Sagduyu
    Anthony Ephremides
    Wireless Networks, 2009, 15 : 651 - 666
  • [28] A game-theoretic analysis of denial of service attacks in wireless random access
    Sagduyu, Yalin Evren
    Ephremides, Anthony
    2007 5TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1-2, 2007, : 224 - +
  • [29] A game-theoretic analysis of denial of service attacks in wireless random access
    Sagduyu, Yalin Evren
    Ephremides, Anthony
    WIRELESS NETWORKS, 2009, 15 (05) : 651 - 666
  • [30] Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems
    Tian, Wen
    Ji, Xiao-Peng
    Liu, Weiwei
    Zhai, Jiangtao
    Liu, Guangjie
    Dai, Yuewei
    Huang, Shuhua
    ETRI JOURNAL, 2019, 41 (05) : 585 - 598